Explore the evolving reconnaissance phase of Advanced Persistent Threat (APT) attacks in this informative conference talk by Talos researcher Paul Rascagneres. Delve into how APT actors are adapting their tactics to protect valuable zero-day exploits and malware frameworks. Examine various case studies illustrating the increasing complexity and importance of the reconnaissance phase, focusing on malicious documents (Microsoft Office and Hangul Word Processor) and watering hole attacks. Learn about campaigns targeting political and military organizations in the USA, Europe, and Asia. Gain insights into the techniques and obfuscation methods employed by these actors, including macro usage, JavaScript and PowerShell analysis, Flash object exploitation, and Python malware on MacOS. Discover how first-stage malware is used for reconnaissance, with a specific example targeting South Korea's public sector. Conclude with an overview of mitigation strategies for applications like Microsoft Office and Hangul Word Processor, as well as the Windows operating system, to enhance protection against the described threats.
Overview
Syllabus
Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer
Taught by
NorthSec